Tracing method and system and terminal equipment

A technology of terminal equipment and preset applications, applied in the direction of internal/peripheral computer component protection, etc., can solve problems that are not conducive to recovering stolen terminal equipment, achieve the effect of reducing vigilance and improving success rate

Inactive Publication Date: 2018-01-16
CHINA TELECOM CORP LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the setting of security verification means is likely to increase the vigilance of thieves who repeatedly fail to enter the password, so as to unplug the battery to completely cut off the communication between the terminal device and the outside world, which is even more unfavorable for recovering the stolen terminal device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tracing method and system and terminal equipment
  • Tracing method and system and terminal equipment
  • Tracing method and system and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0033] figure 1 It is a flowchart of an embodiment of the tracking method of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a tracing method and system and terminal equipment, and relates to the field of mobile security. The tracing method comprises the steps that the terminal equipment responds a preset trigger condition to conduct identity authentication on a user using the terminal equipment at present secretly; on the condition that identity authentication fails, the terminal equipment acquires information for tracing the terminal equipment secretly; and the terminal equipment sends the acquired information for tracing the terminal equipment out to track the terminal equipment. Accordingto the method, by conducting identity authentication on the user using the terminal equipment at present secretly, acquiring the information for tracking the terminal equipment secretly when identityauthentication fails and sending the information out, tracking can be completed on the condition that a stealer is unaware, the vigilance of the stealer is reduced, and the success rate that the lostterminal equipment is taken back is increased.

Description

technical field [0001] The invention relates to the field of mobile security, in particular to a tracking method and terminal equipment. Background technique [0002] Terminal devices such as mobile phones and tablet computers usually contain a large amount of personal information, so it is very important to ensure the security of terminal devices. [0003] At present, after a terminal device is stolen, the thief often performs operations such as shutting down the device and transferring money in the first time. In the prior art, safety verification means such as setting a power-off password and a transfer password can be used to prevent sensitive operations such as power-off and money transfer by the thief. [0004] However, the setting of security verification means is likely to increase the vigilance of thieves who repeatedly fail to input passwords, thereby unplugging the battery to completely cut off the communication between the terminal device and the outside world, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/88
Inventor 虞晨磊黄铖斌王锦华匡华龙姜钰
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products